Thoughtful perspectives on Modern Vulnerability Management.
Ask Us About Our Data Science
What’s in a buzzword, like data science? A lot of resentment, for sure, but also a chance to explain.Read More
Harnessing the 3 P’s of Customer Experience
SaaS is here to stay. Its success, helped along with the cost, deployment, and scalability advantages inherent in subscription models, and cemented further by...
Q1 2021 CVE Review
Since this week marks the start of the 2nd quarter, I figured it would be interesting to see where we are with the number of CVEs published this year. Since...
Inactivate an Asset
When managing systems, there are situations where you want to remove an asset, which could be a server, router, or laptop. One reason to manually remove an...
What is Vulnerability Management Prioritization?
Vulnerability management prioritization is arguably the most important aspect of a modern vulnerability management program. Prioritization is vital because...
Vulnerability Disclosure and Responsible Exposure
We discuss and add some quantifiable data to a hot-button issue in the cybersecurity industry: responsible disclosure of vulnerabilities and exploits.
Risk-Based Vulnerability Management
The State of Risk-Based Vulnerability Management in 2021
Being the first at something means that you have something to prove. The proof keeps coming. At Kenna Security, we pioneered the strategy of risk-based...
5 Things Every CIO Should Know About VM
Read this eBook to learn what a modern vulnerability management approach means to your IT operation. You discover how it helps CIOs like you create more efficient and effective teams while reducing your company’s overall risk profile.
Ask Us About Our Data Science
What’s in a buzzword, like data science? A lot of resentment, for sure, but also a chance to explain. A buzzword is a word or phrase, new or already existing,...
Introducing Rick Ehrhart, Our New API Evangelist
Hello world! I would like to introduce myself: I’m Rick, Kenna Security’s new API Evangelist. Prior to Kenna, I held positions at Ionic Security, Tintri, and...
What Are the Odds? A Powerful Open Source Tool Helps Predict Exploits
In a perfect world, you’d have the time and resources to apply every single patch to every identified vulnerability before it’s exploited. But the reality is...
Risk, Measured: 7 Characteristics of Good Metrics
Continuing our miniseries into Risk, Measured: we go back to statistics class and discuss some of the characteristics of good metrics to help people...
How Security CX Teams Can Ensure CISOs Get What They Need
The unique requirements of Security teams don’t leave much room for guesswork. Theirs is a technical and precise business because the stakes are high and...
For 3rd Year, Kenna Honored by Cybersecurity Insiders
Again and again and again! Here’s another one. For the third year in a row, Kenna Security has won a Cybersecurity Excellence Award from Cybersecurity Insiders.